Search
Now showing items 1-10 of 17
A review of unstructured data analysis and parsing methods
(IEEE, 2020-03)
Computer applications generate an enormous amount of data every day through their logs, system-generated files or other reports. This generated data depicts the state of the running system and contains abundant information ...
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Low-complexity high-performance deep learning model for real time low cost embedded fire detection system.
(Elsevier, 2020)
Correct and timely detection of fires has been an active area of research. Both shallow learning (with manual feature engineering),
as well as deep learning (with its promise of automatically extracting meaningful ...
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
Tunable memristor emulator using off-the-shelf components.
(Elsevier, 2020)
Emerging memristor technology is as of late drawing broad consideration due to its potential for several applications. But, the non-availability of solid-state memristive devices puts a practical limitation. So, this paper ...
Cooperative industrial multi robot system using multi agent reinforcement learning
(Athlone Institute of Technology, 2020-06)
This poster describes the research definition process for thisearly stage PhD.
Our goal is to investigate the feasibility of using multi-agent deep learning (MADRL) as an approach for solving cooperative multi robot system ...
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)
Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ...
Four quadrant analog multiplier based memristor emulator using single active element
(Elsevier, 2020-02)
This paper presents a novel Four Quadrant Analog Multiplier (FQAM) circuit and its applications using a single active element Current Differencing Transconductance Amplifier (CDTA) and two NMOS. This circuit has a cascadability ...
The context aware security policy language for Zero Trust Network
(Athlone Institute of Technology, 2020-06)
With the development of the pervasive computing, the number of devices accessing to network is increasing. Though this condition brings us a more convenient and intelligent lifestyle, accompanying with it is the higher ...
Shallow and deep learning approaches for network intrusion alert prediction.
(Elsevier, 2020)
The ever-increasing frequency and intensity of intrusion attacks on computer networks worldwide has necessitated intense research efforts towards the design of attack detection and prediction mechanisms. While there are a ...